Title: An Integrated Multi-level Security Model for Malicious Attacks Resiliency in Vehicular Ad hoc Network (VANET)
1 An Integrated Multi-level Security Model for
Malicious Attacks Resiliency in Vehicular Ad hoc
Network (VANET)
2Introduction
- Vehicular ad-hoc network is a special kind of
network in which nodes (Vehicles) can communicate
with each other on the road and with its
Infrastructure.
V2I
2
3VANET Applications
- Safety Applications
- Non Safety Applications
Work Zone Warning!!!
Work Zone Warning!!!
Work in Progress Plz! use Alt. route
Shopping MALL ( TESCO )
Parking Slot Available!!!
Parking Slot Available!!!
RSU
3
4VANET Security Requirements
- Vehicular network applications require security
and the objective of these applications is to
serve users and make their journey secure and
comfortable. - Attackers have their own role in this network and
we cannot predict the dynamic behavior of the
attacker. If an attacker works on a safety
application and changes the content of the safety
message then it poses a very difficult condition
on the road and many users will be affected due
to this kind of attack. - Accidents are often the result of an alteration
of any safety message or the sending of even one
wrong safety message in a network and many human
lives are at risk 1.
5TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
6TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
7Attacker with security goals (CIA) in VANET
8All Possible attacks on security goals (CIA) in
VANET
9Attacks on Confidentiality in VANET
- Man in the Middle (MiMA) Attack
10Attacks on Integrity in VANET
Message Alteration Attack
Message Fabrication Attack
Incorrect Data Injecting Attack
11Scenario One Attack on the integrity of the data
12Attacks on Availability in VANET
- DENIAL OF SERVICE (DOS)
- In VANET, DOS shall not be allowed to happen,
where seamless life critical information must
reach its intended destination securely and
timely. In summary, there are three ways the
attackers may achieve DOS attacks. - There are three levels of DOS attacks as
described below. - Basic Level Overwhelm the Node Resources
- Extended Level Jamming the Channel
13DENIAL OF SERVICE (DOS) ATTACK IN VANET
- Basic Level Overwhelm the Node Resources
14DENIAL OF SERVICE (DOS) ATTACK IN VANET
- Extended Level Jamming the Channel
15Distributed Denial of service (DDOS) Attack
16Attacks on Availability in VANET
17Propose Integrated Multi-level Security Model
18Resiliency measures in integrated Security model
19Chain of Trust (COT)
- 1. Trust Inside TPM
- 2. Trust between TPM and embedded Smart Vehicle
Sensors - 3. Trust between Vehicle to Vehicle (V2V)
- 4. Trust between Vehicle to RSU (V2R)
20Chain of Trust (COT)
21Chain of Trust (COT)
- 2. Trust between TPM and embedded Smart Vehicle
Sensors
22Chain of Trust (COT)
- 3. Trust between Vehicle to Vehicle (V2V)
23Case One (TPM with Normal User)
24Case Two (TPM with Attacker User)
25User (A) communication with RSU
26Case Two (Communication with Attacker User)
27Chain of Trust Process
28Conclusion
- Security is the top level module that is always
demanded for safe and reliable VANET
communications. However, the dynamic nature of
the vehicular network makes it difficult to
identify the attackers, attack types and behavior
of the attackers. - The aim of an attacker is to launch attacks in
the network and create problems for other users
to achieve their particular goals. Whenever a
normal user changes his/her behavior to become an
attacker and launches an attack, this attack
would create problems for other components of the
network and users who utilize that particular
component(s). - Each attack has its own effect level and it is
very hard to identify that particular attack in a
particular region of network.
29Thank you..
29
30Journal Paper
- Please download complete research paper from
research gate.
30